SlideShare a Scribd company logo
1 of 21
Contents:
1.Introduction
2.What is fog computing?
3.What is need for fog computing?
4.How Does It Works?
5.Limitations Of cloud.
6.Limitations Over come in Fog.
5.Cloud v/s fog.
6.Applications.
7.SECURITY ISSUES.
8.PRIVATE ISSUES.
9.Benfits Of Fog.
10.Conclusion
 Fog computing is a term created by Cisco that
refers to extending cloud computing to the edge
of an enterprise's network.
 It is also known as Edge Computing or fogging,
fog computing.
*
Cisco introduced its fog computing vision in
“January 2014” as a way of bringing cloud
computing capabilities to the edge of the network
and as a result, closer to the rapidly growing
number of connected devices and applications that
consume cloud services and generate increasingly
massive amounts of data.
By handling these services that make up the
Internet of Things (IoT) at the network edge, data
can in many cases be processed more efficiently
than if it needed to be sent to the cloud for
processing.
*
Fog Computing extends the cloud computing paradigm
to the edge of the network. While fog and cloud use the
same resources (networking, compute, and storage) and
share many of the same mechanisms and attributes
(virtualization, multi-tenancy) the extension is a non-
trivial one in that there exist some fundamental
differences stemming from the reason fog computing
was developed: to address applications and services that
do not fit the paradigm of the cloud.
*
*
 cloud computing has so many advantages, it
also suffers from certain shortcomings too.
 High capacity(bandwidth).
 Client access link.
 High latency.
 Security.
*
Reduction in data movement across the
network resulting in reduced congestion.
Elimination of bottlenecks resulting from
centralized computing systems.
Improved security of encrypted data as it stays
closer to the end user.
*
*
Requirement Cloud computing Fog computing
Latency high low
Delay jitter High Very low
Location of server
nodes
With in internet At the edge of
local n/w
Distance between t
he client and serve
r
Multiple hops One hop
Security Undefined Can be defined
Attack on data enr
outer
High probability Very Less
probability
Location awarenes
s
No Yes
Health care: The cloud computing market for healthcare
is expected to reach $5.4 billion by 2017, and fog computing would
allow this on a more localized level.
*
*
*
*
The main security issues are authentication at
different levels of gateways as well as (in case of
smart grids) at the smart meters installed in the
consumer’s home. Each smart meter and smart
appliance has an IP address. A malicious user
can either tamper with its own smart meter, report
false readings, or spoof IP addresses.
*
In smart grids, privacy issues deal with hiding details,
such as what appliance was used at what time,
while allowing correct summary information for
accurate charging.
*
Extending the cloud closer to the things that generate and
act on data benefits the business in the following ways:
● Better security: Protect your fog nodes using the same
policy, controls, and procedures you use in other
parts of your IT environment. Use the same physical
security and cybersecurity solutions.
● Deeper insights, with privacy control: Analyze sensitive
data locally instead of sending it to the cloud for
analysis. Your IT team can monitor and control the devices
that collect, analyze, and store data.
● Lower operating expense: Conserve network bandwidth
by processing selected data locally instead of
sending it to the cloud for analysis.
*
Fog computing will grow in helping the emerging network
paradigms faster processing with less delay and delay jitter
,cloud computing would serve the business community
meeting their high end computing demands lowering the
cost based on a utility pricing model.
*
Fog
Fog

More Related Content

What's hot

Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud ComputingAhmed Banafa
 
A Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsA Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsAM Publications
 
Fog computing. Igor Tsybin
Fog computing. Igor TsybinFog computing. Igor Tsybin
Fog computing. Igor TsybinIgor Tsybin
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...Biren Gandhi
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEXAngelo Corsaro
 
fog computing
fog computingfog computing
fog computingMphasis
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelAhmed Banafa
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of ThingsS.Mostafa Sayyedi
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)Iffat Anjum
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog ComputingEr. Ajay Sirsat
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesBiren Gandhi
 

What's hot (19)

Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
 
A Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsA Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and Solutions
 
Fog ppt
Fog pptFog ppt
Fog ppt
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing. Igor Tsybin
Fog computing. Igor TsybinFog computing. Igor Tsybin
Fog computing. Igor Tsybin
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
fog computing
fog computingfog computing
fog computing
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog Computing
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and Architectures
 

Similar to Fog

fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityfPrathmeshnawale2
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingShivangi Bali
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingFredReynolds2
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESsuthi
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfEnterprise Wired
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computingAliAbdelwahab6
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Studyijtsrd
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions IJECEIAES
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fogRezgar Mohammad
 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 

Similar to Fog (20)

fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityf
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Fog computing
Fog computingFog computing
Fog computing
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
Fog computing
Fog computing Fog computing
Fog computing
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Study
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
Fog computing
Fog computingFog computing
Fog computing
 

Recently uploaded

Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 

Recently uploaded (20)

Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

Fog

  • 1.
  • 2. Contents: 1.Introduction 2.What is fog computing? 3.What is need for fog computing? 4.How Does It Works? 5.Limitations Of cloud. 6.Limitations Over come in Fog. 5.Cloud v/s fog. 6.Applications. 7.SECURITY ISSUES. 8.PRIVATE ISSUES. 9.Benfits Of Fog. 10.Conclusion
  • 3.  Fog computing is a term created by Cisco that refers to extending cloud computing to the edge of an enterprise's network.  It is also known as Edge Computing or fogging, fog computing. *
  • 4. Cisco introduced its fog computing vision in “January 2014” as a way of bringing cloud computing capabilities to the edge of the network and as a result, closer to the rapidly growing number of connected devices and applications that consume cloud services and generate increasingly massive amounts of data. By handling these services that make up the Internet of Things (IoT) at the network edge, data can in many cases be processed more efficiently than if it needed to be sent to the cloud for processing. *
  • 5. Fog Computing extends the cloud computing paradigm to the edge of the network. While fog and cloud use the same resources (networking, compute, and storage) and share many of the same mechanisms and attributes (virtualization, multi-tenancy) the extension is a non- trivial one in that there exist some fundamental differences stemming from the reason fog computing was developed: to address applications and services that do not fit the paradigm of the cloud. *
  • 6. *
  • 7.  cloud computing has so many advantages, it also suffers from certain shortcomings too.  High capacity(bandwidth).  Client access link.  High latency.  Security. *
  • 8. Reduction in data movement across the network resulting in reduced congestion. Elimination of bottlenecks resulting from centralized computing systems. Improved security of encrypted data as it stays closer to the end user. *
  • 9. * Requirement Cloud computing Fog computing Latency high low Delay jitter High Very low Location of server nodes With in internet At the edge of local n/w Distance between t he client and serve r Multiple hops One hop Security Undefined Can be defined Attack on data enr outer High probability Very Less probability Location awarenes s No Yes
  • 10.
  • 11.
  • 12. Health care: The cloud computing market for healthcare is expected to reach $5.4 billion by 2017, and fog computing would allow this on a more localized level. *
  • 13. *
  • 14. *
  • 15. *
  • 16. The main security issues are authentication at different levels of gateways as well as (in case of smart grids) at the smart meters installed in the consumer’s home. Each smart meter and smart appliance has an IP address. A malicious user can either tamper with its own smart meter, report false readings, or spoof IP addresses. *
  • 17. In smart grids, privacy issues deal with hiding details, such as what appliance was used at what time, while allowing correct summary information for accurate charging. *
  • 18. Extending the cloud closer to the things that generate and act on data benefits the business in the following ways: ● Better security: Protect your fog nodes using the same policy, controls, and procedures you use in other parts of your IT environment. Use the same physical security and cybersecurity solutions. ● Deeper insights, with privacy control: Analyze sensitive data locally instead of sending it to the cloud for analysis. Your IT team can monitor and control the devices that collect, analyze, and store data. ● Lower operating expense: Conserve network bandwidth by processing selected data locally instead of sending it to the cloud for analysis. *
  • 19. Fog computing will grow in helping the emerging network paradigms faster processing with less delay and delay jitter ,cloud computing would serve the business community meeting their high end computing demands lowering the cost based on a utility pricing model. *